Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/05/2024, 22:21

General

  • Target

    94bc438fe73af777b3339972a5e4e5d93cba3e937a134a27e7ff4fb41d7eb62a.exe

  • Size

    7.3MB

  • MD5

    eaa9e76db93e9fb08f82f7efb39dabcd

  • SHA1

    48b0965b735e3600deb6652b26873e01ec681408

  • SHA256

    94bc438fe73af777b3339972a5e4e5d93cba3e937a134a27e7ff4fb41d7eb62a

  • SHA512

    b5ea15f76a340c0e1bc59861f77b1d47b7f6ac49ac7dcb271cf85573a45b7fe3661e8df74438a52bf0ba9a5a8c8759d654e65a03232e5936e6125f1a3bcda225

  • SSDEEP

    98304:/yDQkeSLhuba4o3r0fCjA5DT08GHXngvuHEkvPj/zODZVWsikrdrn+oulLguUra0:mQTSLXg6r8G3n4uHNeVThrdrn+F+1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 62 IoCs
  • Modifies registry class 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\94bc438fe73af777b3339972a5e4e5d93cba3e937a134a27e7ff4fb41d7eb62a.exe
    "C:\Users\Admin\AppData\Local\Temp\94bc438fe73af777b3339972a5e4e5d93cba3e937a134a27e7ff4fb41d7eb62a.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\MonKeyDu\zj 1.0.0\install\B22545E\zj.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\94bc438fe73af777b3339972a5e4e5d93cba3e937a134a27e7ff4fb41d7eb62a.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1715897903 " AI_EUIMSI=""
      2⤵
      • Enumerates connected drives
      • Suspicious use of FindShellTrayWindow
      PID:2888
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C152001C5999E16E5EFCA54ED942A1B6 C
      2⤵
      • Loads dropped DLL
      PID:1996
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 7B4EB05D5FD925D0F1A45771A756810E
      2⤵
      • Loads dropped DLL
      PID:1596
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 0006033EBA382981398EBB2EB6C75E74 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      PID:1404
    • C:\Program Files\MonKeyDu\zj\数据处理器4.7.exe
      "C:\Program Files\MonKeyDu\zj\数据处理器4.7.exe" start
      2⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2284
    • C:\Program Files\MonKeyDu\zj\svchost.exe
      "C:\Program Files\MonKeyDu\zj\svchost.exe" start
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic cpu get processorid
        3⤵
        • Modifies data under HKEY_USERS
        PID:956
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic diskdrive get serialnumber
        3⤵
        • Modifies data under HKEY_USERS
        PID:556
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:2624
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004A4" "00000000000003B0"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:2188

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\f763ff1.rbs

      Filesize

      215KB

      MD5

      272bcdf55b9c0fcda043af9980641831

      SHA1

      b851dc64b26eb1995391081711ad8324f53724d5

      SHA256

      32c7999f7db13dbb6ddfbed4fb67f24763afab49cf0558ea56a0b3a464d5800d

      SHA512

      8838d3ff9057880ab67479a45fbca3db2a95c730153bb065f6caf7cc99788f791a60fe6dd742932553d1f2a05424091969fcc3890fb4200cac68644b5ddf7947

    • C:\Users\Admin\AppData\Roaming\MonKeyDu\zj 1.0.0\install\B22545E\libcef.dll

      Filesize

      5.6MB

      MD5

      a02f756c1f46697a79855e1b307f07c6

      SHA1

      d9bc053fe67f638dbfaed19323f8de4ca76e8013

      SHA256

      d53875560cdd7144439812a4f948a9992ffc8d34c1d9545b0e27f55c47e20c8e

      SHA512

      483355954218a486ca79cd72d2b4db437f1710ccc2670233bff8c2a4b4457db715ef83a826c79a70928266169b2054bb53be649643fd6115af7b564e59ce2958

    • C:\Users\Admin\AppData\Roaming\MonKeyDu\zj 1.0.0\install\B22545E\svchost.exe

      Filesize

      2.0MB

      MD5

      9037a40fb3c7b5948345acb3a9401c53

      SHA1

      2957d67dc98c7058e9e556f0690f86b22b1dbd5b

      SHA256

      97b33e2b233b779dad59cecb75f8da31f7a197c278118452dffa94bb6e178aa3

      SHA512

      b129e98fc7bc22186562d9b18f9236f1cc44ad8df657135029f4e1c577eb016d982ae7dce18eb06a3d207cf07a85f9c4986b765b6e918dad902c69ba3424f6cf

    • C:\Users\Admin\AppData\Roaming\MonKeyDu\zj 1.0.0\install\B22545E\zj.msi

      Filesize

      2.0MB

      MD5

      c6a0667438a9173ff5042a2247b5565a

      SHA1

      2a4df3785344f4e8f651f8344bcfb98be47eb64d

      SHA256

      3acbf3783ad80d157c852e7156c64539d805806ff3d4f0867d3858a0dfb5b32b

      SHA512

      acb3929f261b33e70f6d381832953ceef7ffd2b96c80143265b5cf814dc1001859c9c11b609216d50d28923282daab2a06aa077f3bfc295bc6ccdc97c061b23b

    • C:\Users\Admin\AppData\Roaming\MonKeyDu\zj 1.0.0\install\B22545E\数据处理器4.7.exe

      Filesize

      356KB

      MD5

      426bf2fd41c332bfae147c629409527b

      SHA1

      8481f6e0e4ac2dbab1cb4022f3b151de3a23b619

      SHA256

      06a85f5f5fe77b9564e9cc4d795dfc926236788f0f63b2b25d7841190c822f9e

      SHA512

      e42994581f833a98e385d90737952163c9777ef4d88eb25c2a6a80689193cbd244c3b27b28b48212c7d084c58a62e9c558c0e1b22b79a1b8d6ea2aa09fddf10f

    • C:\Windows\Installer\MSI41E3.tmp

      Filesize

      709KB

      MD5

      89136bfd28a2e1ec6b6d841214e1e670

      SHA1

      4c6aab98925cb556f7bf2dbbc9f7ed0da92ef2ab

      SHA256

      1a3c0e60aad0a3bb92a6e0b786df93920aed7b0c7ec56ab49f2692102ac5adec

      SHA512

      22237702745fe11a6f23a943f16a12f23b42fe04d87af6383afeccd854320f3a6961590a76ab6a04f020f9830fb3d9f8b34315ad007a5464dbdba2d543851812

    • C:\Windows\Installer\MSI43F8.tmp

      Filesize

      206KB

      MD5

      385488c351d17ecfa075a763eb5fecee

      SHA1

      88cadb754000d467a5a6cdba1b77a8b2b38f905e

      SHA256

      b3c88eddf3c6f36b0063fe0c4db62950643846c5c616dc2f255aa3a411cbbcff

      SHA512

      64e4341316fa0d10be92720b92adb34e1ef3ca4d39797d97f84d97bca429dd3d46bd6d3849d92652a87cd938cef96166d0cb3f5a79be8fe3899dcb7a8db3a1e3

    • \Users\Admin\AppData\Local\Temp\MSI20BA.tmp

      Filesize

      587KB

      MD5

      c7fbd5ee98e32a77edf1156db3fca622

      SHA1

      3e534fc55882e9fb940c9ae81e6f8a92a07125a0

      SHA256

      e140990b509dd6884a5742bde64f2cdaa10012d472b0b32de43ebecbc83242b6

      SHA512

      8691ac8b214cc1e4f34a3ab2bbc0c2391f7f11ebbe5db0dc82825195b5fe5a05310ed1e14d253a9b74a64050d2f2a6623dd2fcd912f80fef51e51845ef1e3a1a

    • memory/2060-95-0x0000000010000000-0x000000001017D000-memory.dmp

      Filesize

      1.5MB

    • memory/2060-94-0x0000000010000000-0x000000001017D000-memory.dmp

      Filesize

      1.5MB

    • memory/2060-78-0x0000000010000000-0x000000001017D000-memory.dmp

      Filesize

      1.5MB

    • memory/2060-82-0x0000000010000000-0x000000001017D000-memory.dmp

      Filesize

      1.5MB

    • memory/2060-97-0x0000000010000000-0x000000001017D000-memory.dmp

      Filesize

      1.5MB

    • memory/2060-98-0x0000000010000000-0x000000001017D000-memory.dmp

      Filesize

      1.5MB

    • memory/2060-84-0x0000000010000000-0x000000001017D000-memory.dmp

      Filesize

      1.5MB

    • memory/2060-93-0x0000000010000000-0x000000001017D000-memory.dmp

      Filesize

      1.5MB

    • memory/2060-92-0x0000000010000000-0x000000001017D000-memory.dmp

      Filesize

      1.5MB

    • memory/2060-90-0x0000000010000000-0x000000001017D000-memory.dmp

      Filesize

      1.5MB

    • memory/2060-89-0x0000000010000000-0x000000001017D000-memory.dmp

      Filesize

      1.5MB

    • memory/2060-88-0x0000000010000000-0x000000001017D000-memory.dmp

      Filesize

      1.5MB

    • memory/2060-86-0x0000000010000000-0x000000001017D000-memory.dmp

      Filesize

      1.5MB

    • memory/2060-85-0x0000000010000000-0x000000001017D000-memory.dmp

      Filesize

      1.5MB

    • memory/2060-83-0x0000000010000000-0x000000001017D000-memory.dmp

      Filesize

      1.5MB

    • memory/2060-96-0x0000000010000000-0x000000001017D000-memory.dmp

      Filesize

      1.5MB

    • memory/2060-81-0x0000000010000000-0x000000001017D000-memory.dmp

      Filesize

      1.5MB

    • memory/2060-91-0x0000000010000000-0x000000001017D000-memory.dmp

      Filesize

      1.5MB

    • memory/2060-87-0x0000000010000000-0x000000001017D000-memory.dmp

      Filesize

      1.5MB

    • memory/2220-0-0x0000000000190000-0x0000000000191000-memory.dmp

      Filesize

      4KB

    • memory/2284-77-0x000000013F250000-0x000000013F2AC000-memory.dmp

      Filesize

      368KB